Month: April 2024
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable. Source link lol
Read MoreApr 25, 2024NewsroomVulnerability / Zero-Day A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which dubbed the activity ArcaneDoor, attributing it as the handiwork of a previously undocumented sophisticated state-sponsored actor it tracks under the name UAT4356 (aka…
Read MoreApr 25, 2024NewsroomTechnology / Privacy Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser as it works to address outstanding competition concerns from U.K. regulators over its Privacy Sandbox initiative. The tech giant said it’s working closely with the U.K. Competition and Markets Authority (CMA) and hopes…
Read MoreChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past? Source link lol
Read MoreThe past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository Source link lol
Read MoreCan DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach? Source link lol
Read MoreESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications Source link lol
Read MoreVideo Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes 15 Dec 2023 Apple has shipped iOS 17.2 to all users and it includes a new feature that is intended to protect users from attackers who could be misusing the…
Read MoreESET Research ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces 18 Dec 2023 • , 1 min. read In this episode of our podcast, ESET malware researchers talk about the dynamics within and between various Neanderthal groups, the…
Read MoreESET Research, Threat Reports A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts 19 Dec 2023 • , 2 min. read The second half of 2023 witnessed significant cybersecurity incidents. Cl0p, a notorious cybercriminal group known for carrying out ransomware…
Read MoreRecent Posts
- Hacker gets 10 years in prison for extorting US healthcare provider
- Hackers use macOS extended file attributes to hide malicious code
- The true (and surprising) cost of forgotten passwords
- ChatGPT allows access to underlying sandbox OS, “playbook” data
- CISA Releases Nineteen Industrial Control Systems Advisories | CISA